Analysis
-
max time kernel
75s -
max time network
76s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 21:10
Static task
static1
Behavioral task
behavioral1
Sample
0PENM3.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0PENM3.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
README.txt
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
README.txt
Resource
win10v2004-20241007-en
General
-
Target
0PENM3.zip
-
Size
395KB
-
MD5
fb629efa3a1184aae2d334548a7ee618
-
SHA1
a973981a4ec954dd75db4b834d9be1d113bfd529
-
SHA256
27db561f7a41c969d70754f289166d07f0fab55b7f5395adfdc003ad9ca30966
-
SHA512
0ec47fc7976212b0cc1f19670f667693b94a938ac6cbc096a45503cb72f9b37bd1c84424c08bb2e211ad72091b2b81ae8de291cc7485245af3ef73484dfc1857
-
SSDEEP
6144:kidYohZStSB2YIL5e9omn1Zx/FxeB7IXmEEN7nXnp1jBuIeTIumOdZ8Pr+I7AN6O:HYPtACL541ZDwB7IXU5x6IumZ37Amze
Malware Config
Extracted
lumma
https://jubbenjusk.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 1 IoCs
pid Process 1444 Bootstrapper.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4772 1444 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bootstrapper.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 592 7zFM.exe 592 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 592 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 592 7zFM.exe Token: 35 592 7zFM.exe Token: SeSecurityPrivilege 592 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 592 7zFM.exe 592 7zFM.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 592 wrote to memory of 1444 592 7zFM.exe 92 PID 592 wrote to memory of 1444 592 7zFM.exe 92 PID 592 wrote to memory of 1444 592 7zFM.exe 92
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\0PENM3.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\7zO052CACB8\Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\7zO052CACB8\Bootstrapper.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 14083⤵
- Program crash
PID:4772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1444 -ip 14441⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD539b0a312670f8df718d745efc4e7a0b0
SHA1639bb6ce9d8f4d6e764a752ea465e2aaf2fce914
SHA2564b5924690b30abd40e7f4db96657b7575e3d629b7e4602b0d74a361c074f46dc
SHA512ccd93dffeaf42e0f36af6337e559b9dbb36adc46ef6a82fe509da8fc9943b3d6b9df17b239311d9d3f5a97a426a233a42058f77c250231a538694625b1e7a71c